Skip to content

Commit d41c0c2

Browse files
msukkariclaude
andcommitted
docs: update JumpCloud SSO setup instructions
Add clarification on token endpoint auth method requirement and AUTH_SECRET configuration for JumpCloud OIDC setup. Co-Authored-By: Claude Haiku 4.5 <noreply@anthropic.com>
1 parent 24508eb commit d41c0c2

File tree

1 file changed

+3
-0
lines changed

1 file changed

+3
-0
lines changed

docs/docs/configuration/idp.mdx

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -531,6 +531,7 @@ A JumpCloud connection can be used for [authentication](/docs/configuration/auth
531531

532532
When configuring your application:
533533
- Set the SSO type to "OIDC"
534+
- Set the **Token Endpoint Authentication Method** to `client_secret_basic`. JumpCloud defaults to `client_secret_post`, but Sourcebot requires `client_secret_basic`.
534535
- Add `<sourcebot_url>/api/auth/callback/jumpcloud` to the redirect URIs (ex. https://sourcebot.coolcorp.com/api/auth/callback/jumpcloud)
535536
- Set the login URL to `<sourcebot_url>/login`
536537

@@ -539,6 +540,8 @@ A JumpCloud connection can be used for [authentication](/docs/configuration/auth
539540
<Step title="Define environment variables">
540541
The client id, secret, and issuer URL are provided to Sourcebot via environment variables. These can be named whatever you like
541542
(ex. `JUMPCLOUD_IDENTITY_PROVIDER_CLIENT_ID`, `JUMPCLOUD_IDENTITY_PROVIDER_CLIENT_SECRET`, and `JUMPCLOUD_IDENTITY_PROVIDER_ISSUER`)
543+
544+
You must also set the `AUTH_SECRET` environment variable. Generate one with `openssl rand -base64 33` and pass it to your Sourcebot deployment. While `AUTH_SECRET` is auto-generated if not provided, it must be explicitly set for SSO to work reliably across restarts.
542545
</Step>
543546
<Step title="Define the identity provider config">
544547
Create a `identityProvider` object in the [config file](/docs/configuration/config-file) with the following fields:

0 commit comments

Comments
 (0)